Bibliography of Selected Publications for Information Technology Auditors

[1]  Jerry A. Miccolis,et al.  Enterprise Risk Management: Trends and Emerging Practices , 2001 .

[2]  R. Anthony,et al.  Management Control Systems , 2020, Management Control Systems and Tools for Internationalization Success.

[3]  John E. Dobson,et al.  Database Security IX , 1996, IFIP Advances in Information and Communication Technology.

[4]  Joan Hash,et al.  Security Guide for Interconnecting Information Technology Systems , 2002 .

[5]  Sebastiaan H. von Solms,et al.  Information Security — the Next Decade , 1995, IFIP Advances in Information and Communication Technology.

[6]  Marianne Swanson,et al.  Security Self-Assessment Guide for Information Technology Systems , 2001 .

[7]  John Wack,et al.  Guidelines on Firewalls and Firewall Policy , 2002 .

[8]  Grant Norris,et al.  E-Business and ERP: Transforming the Enterprise , 2008 .

[9]  Eckhard D. Falkenberg,et al.  Information System Concepts , 1995, IFIP Advances in Information and Communication Technology.

[10]  Michael P. Cangemi,et al.  Managing the Audit Function. A Corporate Audit Department Procedures Guide, 3rd edition , 1995 .

[11]  Jacob Carlson,et al.  Internet Site Security , 2002 .

[12]  Jack L. Brock Critical Infrastructure Protection "ILOVEYOU" Computer Virus Highlights Need for Improved Alert and Coordination Capabilities , 2000 .

[13]  Louise Yngström,et al.  Information Security in Research and Business , 1997, IFIP — The International Federation for Information Processing.

[14]  J. Pries-Heje,et al.  Diffusion and Adoption of Information Technology , 1996, IFIP — The International Federation for Information Processing.

[15]  Michael Regester,et al.  Risk Issues and Crisis Management: A Casebook of Best Practice , 1998 .

[16]  Jurgen Ringbeck,et al.  Do It Smart: Seven Rules for Superior Information Technology Performance , 1999 .

[17]  Paul L. Walker,et al.  Enterprise Risk Management: Pulling it All Together , 2002 .

[18]  Nobuyoshi Terashima,et al.  Advanced IT Tools , 1996, IFIP — The International Federation for Information Processing.

[19]  Kevin Mandia,et al.  Incident Response: Investigating Computer Crime , 2001 .

[20]  Eckhard D. Falkenberg,et al.  Information System Concepts: An Integrated Discipline Emerging , 2000, IFIP — The International Federation for Information Processing.

[21]  Anup K. Ghosh E-Commerce Security: No Silver Bullet , 1998, DBSec.

[22]  Sushil Jajodia,et al.  Database Security XII , 1999, IFIP — The International Federation for Information Processing.

[23]  Christopher Meyer,et al.  BLUR-The Speed of Change in the Connected Economy , 1998 .

[24]  Charles Jennings,et al.  The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet , 2000 .

[25]  Edward Edward Yourdon,et al.  Death March: The Complete Software Developer's Guide to Surviving Mission Impossible Projects , 1999 .

[26]  Marianne Swanson,et al.  SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems , 1996 .

[27]  Anup K. Ghosh E-Commerce Security: Weak Links, Best Defenses , 1998 .

[28]  Bruce Schneier,et al.  The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .

[29]  Joel C. Willemssen FAA Computer Security: Actions Needed to Address Critical Weaknesses that Jeopardize Aviation Operations, Statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives , 2000 .

[30]  Sean Murphy,et al.  Cryptography: A Very Short Introduction , 2002 .

[31]  Pierangela Samarati,et al.  Security of Data and Transaction Processing , 2000, Springer US.

[32]  Anna M. Rose,et al.  The Automated Spreadsheet , 2001 .

[33]  Paul L. Walker,et al.  Making enterprise risk management pay off , 2002 .